Electrocoagulation process was employed for the treatment of river water flows in Iraq. In this study, a batch Electrocoagulation process was used to treat river water taken from Al - Qadisiyah water treatment plant. electrolysis time, voltage and inter-electrode spacing were the most important parameters to study . A statistical model was developed using the RSM model. The optimum condition after studying the parameter effect the process was 1 cm separating, 30 volts . The RSM model shows the ideal condition of removal for both the TSS and turbidity at 1 cm, 20 volts and 55 min.
The new organic reagent 2-[Benzo thiazolyl azo]-4,5-diphenyl imidazole was prepared and used as complexing agent for separation and spectrophotometric determination of Cu2+ ion in some samples include plants, soil, water and human blood serum. Initially determined all factors effect on extraction method and the results show optimum pH was (pHex=9), optimum concentration was 40?g/5mLCu2+ and optimum shaking time was (15min.), as well stoichiometry study appears the complex structure was 1:1 Cu2+: BTADPI. Interferences effect of cations were studied. Synergism effect shows MIBK gave increasing in distribution ratio (D). Organic solvent effect appears there is no any linear relation between dielectric constant for organic solvent used and dis
... Show MoreThe logistic regression model regarded as the important regression Models ,where of the most interesting subjects in recent studies due to taking character more advanced in the process of statistical analysis .
The ordinary estimating methods is failed in dealing with data that consist of the presence of outlier values and hence on the absence of such that have undesirable effect on the result. &nbs
... Show MoreThe aim of this work is to learn the relationship of the stability of (β) emitter isobars with their shape for some isobaric elements with even mass number (A=152 - 162). To reach this goal firstly the most stable isobar have been determined by plotting mass parabola (plotting the binding energy (B.E) as a function of the atomic number (Z)) for each isobaric family. Then three-dimensional representation graphics for each nucleus in these isobaric families have been plotted to illustrate the deformation in the shape of a nucleus. These three-dimensional representation graphics prepared by calculating the values of semi-axis minor (a), major (b) and (c) ellipsoid axis’s. Our results show that the shape of nuclides which is represented the
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThis paper is concerned with pre-test single and double stage shrunken estimators for the mean (?) of normal distribution when a prior estimate (?0) of the actule value (?) is available, using specifying shrinkage weight factors ?(?) as well as pre-test region (R). Expressions for the Bias [B(?)], mean squared error [MSE(?)], Efficiency [EFF(?)] and Expected sample size [E(n/?)] of proposed estimators are derived. Numerical results and conclusions are drawn about selection different constants included in these expressions. Comparisons between suggested estimators, with respect to classical estimators in the sense of Bias and Relative Efficiency, are given. Furthermore, comparisons with the earlier existing works are drawn.
Recent research looking for acknowledgment of strategically influence of Robinson and self question at progressing the reading comprehension for students of sixth class .
To achieve research goal so the researcher mentally chose primary sixth class at the school (Tashti the primary) that followed education directorate of province (Jamjamal)/Suliymania for the scholastic year 2012-2013 as application field for their experiment of boys' number reached to (95) (female and male)students in reality (32) of the first experimental group and (31) student (female and male) from controlled group, the researcher rewarded between of three variable groups (timing period, intelligence ,Kurdish language degr
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More